Loading...
Browse 22 rust tools
Formal verification tools & services for C/Rust software security & safety.
User-mode Windows agent detecting in-memory & out-of-context code execution.
Static analysis tool enforcing OWASP Top 10 security rules for Rust code.
eBPF-based, AI-driven EDR for edge, containers, and critical infra.
Zero-trust, post-quantum secure connectivity for mission-critical environments.
Per-record KMS with unique key derivation, instant revocation, and OIDC access.
Development platform for building Intel SGX enclaves using Rust language
Device trust mgmt platform using OpenTitan secure silicon for IoT/edge/DC
EDR platform with EPP capabilities for endpoint threat detection and response
Post-quantum cryptography library with NIST-standardized algorithms
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
A reverse engineering framework with a focus on usability and code cleanliness
A portable Rust-based tool for acquiring volatile memory from Linux systems without requiring prior knowledge of the target OS distribution or kernel.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.
High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.
A key and secret validation workflow tool built in Rust, supporting over 30 providers and exporting to JSON or CSV.
A command-line Android APK vulnerability analyzer written in Rust that decompresses and scans APK files using rule-based detection to identify security issues.
Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.
Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.
Get strategic cybersecurity insights in your inbox